You Are Here: Home » Industry News » Intel Chips Prone to Hacks – 64-bit OSs Deemed Vulnerable

Intel Chips Prone to Hacks – 64-bit OSs Deemed Vulnerable

Intel CPUs are prone to hacker attacks after a vulnerability in the way they implement the SYSRET instruction was discovered in their x86-64 extension.

The vulnerability could allow hackers to execute code with kernel privileges while in a non-administrator account, or to gain control of a host operating system after escaping a virtual machine. The U.S. Computer Emergency Readiness Team (US-CERT) issued a security advisory in which it thoroughly details the vulnerability.

“Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape,” says the US-CERT.

Several x64-based operating systems like Windows 7, Windows Server 2008 R2, 64-bit FreeBSD, 64-bit NetBSD, as well as systems that include the Xen hypervisor, are exposed to this vulnerability.

While 32-bit operating systems are safe, Intel CPUs that use the Intel 64 extension need the security patches released by Microsoft in their MS12-042 security bulletin.

The VMware virtualization software does not seem affected by the vulnerability as its hypervisor doesn’t use the SYSRET instruction, making the virtualization solution safe from attacks. AMD is also on the list of vendors not affected by the privileged escalation exposure issued by US-CERT. Because the SYSRET instruction is handled differently on AMD CPUs, the CVE-2012-0217 vulnerability does not apply to these chips.

AMD processors’ SYSRET behavior is such that a non-canonical address in RCX does not generate a #GP while in CPL0. We have verified this with our architecture team, with our design team, and have performed tests that verified this on silicon,said AMD. “Therefore, this privilege escalation exposure is not applicable to any AMD processor“.

About The Author

Security Researcher

Liviu Arsene is the proud owner of the secret to the fountain of never-ending energy. That’s what’s been helping him work his everything off as a passionate tech news editor for the past couple of years. He is the youngest and most restless member of the Bitdefender writer team and he covers mobile malware and security topics with fervor and a twist. His passions revolve around gadgets and technology, and he’s always ready to write about what’s hot and trendy out there in geek universe.

Number of Entries : 215

Comments (4)

  • Kashish Sharma

    shit, ! that’d be real bad for the host.
    Isn’t there any bug fixer for this? Any update? Any software that tackles it ? And how does one get to know if he’s one of the people who are vulnerable, if he has an intel CPU hardware…?

  • Liviu Arsene

    Microsoft issued a couple of security patches for vulnerable 64-bit OSs in their MS12-042 security bulletin. Here’s the link:
    Also, check out the security advisory from US-CERT for more details:


Leave a Comment

© 2012 Powered By Bitdefender

Scroll to top